A key purpose of the @RISK is to provide the data that will ensure that the 20 Critical Controls (the US and UK benchmark for effective protection of networked systems) continue to be the most effective defenses for all known attack vectors. But since it is also valuable for security practitioners, SANS is making it available to the 145,000 security practitioners who have completed SANS security training and others at their organizations who hope to stay current with the offensive methods in use.

2) Plan to attend the SANS Security Leadership Summit, April 30th and
May 1st, in Boston. The format will partner CISOs with leading SANS
experts across a broad range of key security topics and emerging trends.
Choose from four classes that take place afterwards (May 2nd - 6th)
including ICS/SCADA Security Essentials, Security Leadership,
Implementing the Critical Security Controls and Security Bootcamp.
http://www.sans.org/info/154465

This is a list of recent vulnerabilities for which exploits are
available. System administrators can use this list to help in
prioritization of their remediation activities. The Qualys Vulnerability
Research Team compiles this information based on various exploit
frameworks, exploit databases, exploit kits and monitoring of internet
activity.

(c) 2014. All rights reserved. The information contained in this newsletter, including any external links, is provided "AS IS," with no express or implied warranty, for informational purposes only.

Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit https://www.sans.org/account